Browse Definitions:
  • February 27, 2013 27 Feb'13

    Sage CRM

    Sage CRM is a line of software products for customer relationship management in the small-to-medium size business market.  Continue Reading

  • February 27, 2013 27 Feb'13

    interrupt marketing

    Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.  Continue Reading

  • February 27, 2013 27 Feb'13

    discoverability marketing

    Discoverability marketing is the practice of making it easier for customers or potential customers to find products when they are actively looking for them or have demonstrated a need for them.  Continue Reading

  • February 27, 2013 27 Feb'13

    digital CRM

    Digital customer relationship management is the use of Internet communications channels and technologies to enhance customer relationship management (CRM) and customer experience management (CEM ) initiatives.  Continue Reading

  • February 26, 2013 26 Feb'13

    Shamoon

    Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector.  Continue Reading

  • February 22, 2013 22 Feb'13

    Google Knowledge Graph

    Google Knowledge Graph is a knowledge base integrated with the Google search engine for a visually appealing and intuitive presentation of information related to queries. .  Continue Reading

  • February 21, 2013 21 Feb'13

    Thunderbolt

    Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Maps

    Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world. In addition to conventional road maps, Google Maps offers aerial and satellite views of many places.  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Now

    Google Now is a Web-based service provided by Google that serves as a day planner. It works on tablet devices and smartphones that run Google's Android OS.  Continue Reading

  • February 20, 2013 20 Feb'13

    3Vs (volume, variety and velocity)

    3Vs (volume, variety and velocity) are three defining properties of big data. Volume refers to the sheer amount of data, variety refers to the number of types of data and velocity refers to the speed of processing.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic attack

    A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic

    Business logic is the programming that manages communication between an end user application and a database. The main components of business logic are business rules and workflows.  Continue Reading

  • February 12, 2013 12 Feb'13

    Android 4.2 Jelly Bean

    Android 4.2 Jelly Bean is the version of Google's mobile operating system that follows Android 4.0 Ice Cream Sandwich (ICS). Android 4.2 Jelly Bean will run on tablet computers and smartphones.  Continue Reading

  • February 12, 2013 12 Feb'13

    correlation coefficient

    A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another. In positively correlated variables, the value increases or decreases in tandem. In negatively ...  Continue Reading

  • February 12, 2013 12 Feb'13

    positive correlation

    A positive correlation is a relationship between two variables such that their values increase or decrease together. Correlations are ranked on a scale from +1 to -1. In a perfect positive correlation, ranked as +1, an increase or decrease in one ...  Continue Reading

  • February 11, 2013 11 Feb'13

    Five Steps to Incident Management in a Virtualized Environment

    Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective...  Continue Reading

  • February 07, 2013 07 Feb'13

    CES (Consumer Electronics Show)

    CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.   Continue Reading

  • February 05, 2013 05 Feb'13

    spaghetti diagram

    A spaghetti diagram is a graphic representation of the flow of some entity, such as a person, a product or a piece of information, as it goes through some process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close